Week 8 (extra i guess) Flashcards
CPS Vulnerabilities
Causes of vulnerabilities include isolation assumption, increased connectivity, heterogeneity, USB usage, bad practices, spying, homogeneity, and suspicious employees.
Cyber Vulnerabilities
Examples Include:
Inter-control Center Communications Protocol (ICCP),
TCP/IP,
Communication protocols like Modbus.
Physical Vulnerabilities
Involves insufficient security for components, susceptibility to tampering, and risks to medical devices.
Technical Vulnerabilities
Arise from human awareness and skill deficiencies.
Platform Vulnerabilities
Related to configuration, hardware, software, and lack of protection.
Management Vulnerabilities
Due to the absence of security policies and standards.
False Data Injection (FDI) Attacks
FDI attacks target actuators or sensors in control systems, causing physical impact.
These attacks can lead to significant physical damage, and security mechanisms need to complement traditional technologies like encryption and authentication.
Covert/Stealthy Attacks
Challenges in detecting adaptive adversaries aiming to raise pressure without being noticed.
Different types of stealthy FDI attacks, including surge attacks, bias attacks, and geometric attacks, each with varying levels of perturbation and damage.
Fuzzing in CPS Security
Fuzz testing as an automated method to reveal software defects and vulnerabilities in CPS.
Various fuzzing tools, such as beSTORM, Sulley, SMOD, and modbus-cli, used for testing ICS components.